US20150332032A1 - Electronic Device with Method for Controlling Access to Same - Google Patents
Electronic Device with Method for Controlling Access to Same Download PDFInfo
- Publication number
- US20150332032A1 US20150332032A1 US14/276,107 US201414276107A US2015332032A1 US 20150332032 A1 US20150332032 A1 US 20150332032A1 US 201414276107 A US201414276107 A US 201414276107A US 2015332032 A1 US2015332032 A1 US 2015332032A1
- Authority
- US
- United States
- Prior art keywords
- user
- electronic device
- image data
- access
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/20—Analysis of motion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Definitions
- the present disclosure is related generally to user authentication techniques on electronic devices.
- biometric authentication Although the potential advantages of using biometric authentication over traditional personal identification number (“PIN”) authentication have long been understood, its use in consumer electronic devices has only recently become popular. With biometric authentication, a user does not need to enter a PIN and, under the right conditions, does not even need to touch the device in order to unlock it.
- PIN personal identification number
- biometric authentication schemes use the same basic access logic that traditional PIN-based systems use. That is, a user is either authenticated or is not. The user either gains full access or no access. Furthermore, they generally do not adjust in real-time for dynamic conditions such as the movement and position of the user.
- FIG. 1A is a front view of an electronic device according to an embodiment
- FIG. 1B is a rear view of an electronic device according to an embodiment
- FIG. 2 is a block diagram of the electronic device according to an embodiment
- FIG. 3 is a diagrammatic view of a scenario in which the electronic device may be used
- FIG. 4 is a process flow diagram of a method that may be carried out in an embodiment
- FIG. 5 is a diagrammatic view of another scenario in which the electronic device may be used.
- FIG. 6 is a process flow diagram of a method that may be carried out in another embodiment.
- an electronic device (also referred to as “the device”) is able to alter one or more settings of its imager (e.g., its camera) based on the motion of a user that the device is attempting to authenticate.
- the device captures a first set of image data of the user (e.g., a moving video or still image of the user), alters a setting of the imager based on the motion, captures a second set of image data of the user, and authenticates the user based on the second set of image data.
- the device grants the user a first level of access to the device based on the first set of image data and grants the user second level of access to the device based on the second set of image data.
- the number of possible access levels is not limited, and the example of two levels discussed herein is only meant to be illustrative.
- the electronic device may capture the two sets of image data with two different imagers, stitch the sets of image data together, and carry out authentication on the stitched sets of image data.
- the number of imagers that may be used is not limited to two, however.
- an embodiment of the electronic device (“the device”), generally labeled 100 , includes a housing 102 having a front side 104 and a rear side 106 .
- a first imager 110 A Set along the perimeter of the housing are a first imager 110 A, a second imager 110 B, a third imager 110 C, and a fourth imager 110 D.
- Each of the first through fourth imagers has a field of view that extends outwardly from the perimeter of the device 100 .
- Also set along the perimeter of the device 100 are a first motion sensor 116 A, a second motion sensor 116 B, a third motion sensor 116 C, and a fourth motion sensor 116 D.
- Each motion sensor is configured to sense motion external to device 100 .
- Each motion sensor may be implemented as a passive infrared detector, such as a digital thermopile sensor, or as an active sensor that uses reflected light of a light source of the device 100 .
- a display 108 e.g., an organic light-emitting diode display
- a fifth imager 110 E e.g., a front facing camera
- a sixth imager 110 F e.g., a rear facing camera
- the electronic device 100 may be implemented as other types of devices, including a tablet computer, portable gaming device, and a wearable device (e.g., a smart watch).
- an embodiment of the electronic device 100 includes a processor 202 , network communication hardware 204 (e.g., WiFI chip or a cellular baseband chipset), an audio output 206 (e.g., a speaker), a memory 208 (which can be implemented as volatile memory or non-volatile memory), and a light source 212 (e.g., an infrared light-emitting diode).
- the processor 202 retrieves instructions and data from the memory 208 and, using the instructions and data, carries out the methods described herein.
- FIG. 2 including the elements of FIGS. 1A and 1B that appear in FIG.
- data pathways 226 are communicatively linked to one or more other elements via one or more data pathways 226 .
- Possible implementations of the data pathways 226 include wires, conductive pathways on a microchip, and wireless connections.
- Possible implementations of the processor 202 include a microprocessor and a controller.
- the electronic device 100 is lying on a table in a room 304 .
- a user 302 of the device enters the room 104 at position A and is moving.
- the first motion sensor 116 A detects the user 302 and provides data regarding the user to the processor 202 ( FIG. 2 ), including data regarding the user's position, motion (including the user's gait), speed, and context.
- the processor 202 turns on the first imager 110 A and controls the first imager 110 A to capture a first set of image data (i.e., a still image, multiple still images, or multiple images organized as a moving image) of the user 302 (block 402 ) and provides the first set of image data to the processor 202 .
- the processor 202 attempts to authenticate the user 302 using the first set of image data.
- the processor 202 may attempt to authenticate the user 302 based on biometric data, such as the user's body geometry (e.g., the user's body shape, gender, height, girth, and gait).
- the processor 202 determines that it is possible that the user 302 is the authorized user. Conversely, if the image data indicates that the user 302 is a short female, then the authentication will fail.
- the processor 202 determines, with at least a 50% confidence level (based on its authentication attempt with the first set of image data) that the user 302 is an authorized user. Based on this determination, the processor 202 grants the user 302 a first level of access to the device 100 .
- the first level of access may involve granting the user 302 access to telephone functions or lower security applications of the device 100 .
- the processor 202 may control the audio output 206 to inform that user 302 that “You missed two phone calls and have one voicemail.”
- the processor 202 may also control the display 108 to display the user's access level (e.g., “You are now able to access the phone functions”).
- the processor 202 continues to receive data (position, motion, speed, and context) from the first motion sensor 116 A.
- the processor 202 analyzes the data from the first motion sensor 116 A.
- the processor 202 alters a setting of the first imager 116 A based on the detected motion. For example, the processor 202 may determine, based on the detected motion, that the user 302 is moving at or above a certain speed threshold (e.g., 3 feet per second), and, based on this fact, may increase the frame rate of the first imager 110 A (e.g., from 20 frames per second (“fps”) to 50 fps).
- a certain speed threshold e.g., 3 feet per second
- This increase in frame rate allows the first imager 110 A to obtain more detail about the user in order to compensate for the fact that the user 302 is now in motion or is now moving faster.
- Other ways that the processor 202 can alter a setting of the first imager 110 A include controlling the first imager 110 A to change one or more of its shutter speed, shutter timing, illumination setting, resolution, aperture, and zoom setting. In various embodiments, any or all of these changes may be triggered by the same motion sensor that prompted the processor 202 to turn on the first imager 202 .
- the processor 202 controls the first imager 110 A to capture a second set of image data of the user 302 (block 406 ) and provide the second set of image data to the processor 202 .
- the processor 202 may receive a second moving video of the user from the first imager 110 A, this time at the higher frame rate.
- the processor 202 is able to use the second set of image data (e.g., the second, higher-frame-rate moving video) to authenticate the user 302 (block 408 ).
- the processor 202 may authenticate the user 302 with a high enough confidence level to grant the user 302 a second level of access.
- the processor 214 grants the user 302 the second level of access to the device 100 based on the second set of image data. Granting the second level of access may involve the processor 202 granting the user 302 access to one or more of pictures, files, emails, or higher security applications on the device 100 .
- the processor 202 may also control the display 108 to display the user's access level (e.g., “You are now able to access email”).
- the device 100 uses multiple imagers to gradually authenticate a user. Referring to FIGS. 5 and 6 , a procedure for doing so will now be described.
- the electronic device 100 is lying on a table in a room 504 .
- a user 502 of the device enters the room 504 at position A and is moving.
- the first motion sensor 116 A detects the user 502 and provides data regarding the user, such as the user's position, motion (including the user's gait), speed, and context, to the processor 202 ( FIG. 2 ).
- the processor 202 turns on the first imager 110 A and controls the first imager 110 A to capture a first set of image data of the user 302 (block 602 ) and provides the first set of image data to the processor 202 .
- the processor 202 attempts to authenticate the user 502 using the first set of image data.
- the processor 202 determines, with at least a 50% confidence level based on its authentication attempt with the image data that the user 502 is an authorized user. Based on this determination, the processor 202 grants the user 502 a first level of access to the device 100 (block 604 ).
- the processor 202 then receives data regarding the user, including the user's position, motion (including the user's gait), speed, and context, from the second motion sensor 116 B.
- the processor 202 analyzes the data from the second motion sensor 116 B and, based on this motion data (and possibly based on further data from the first motion sensor 116 A) determines that the user 502 has moved within viewing range of the second imager 110 B.
- the processor 202 reacts by turning on the second imager 110 B and controlling the second imager 110 B to capture a second set of image data of the user 502 (block 606 ).
- the controller 202 then stitches the first set of image data and the second set of image data together (block 608 ).
- the processor 202 grants the user 502 a second level of access to the electronic device 100 based on the stitched first and second sets of image data.
- the processor 202 may also use the stitched images to assess the environment surrounding the device 100 —such as the walls, ceiling, room settings, and table—and grant a level access to the user if the processor 202 determines that the environment is specific to the user (the user's house, office, car, etc.)
- the processor 202 can also use the surrounding environment to reinforce the biometric data (i.e., the user's gait, etc.) collected regarding the user.
- the combination of the environmental authentication and the biometric authentication is enough for the processor 202 to raise the level of access from a first level to a second level at block 610 .
- the process described in conjunction with FIG. 6 is not limited to two imagers.
- the third and fourth motion sensors 116 C and 116 D could detect the motion and signal the processor 202 .
- the processor 202 could react by activating the third imager 110 C and the fourth imager 110 D, respectively, control the imagers to capture third and fourth sets of video data, and perform stitching (and possibly environmental analysis) in order to grant the second level of access, or even to grant further levels of access.
- the process described in conjunction with FIG. 6 may also be carried out with sensors of the device 100 , such as the motion sensors 116 A- 116 D.
- the processor 202 may stitch the data from the first motion sensor 116 A and the second motion sensor 116 B together.
- the stitched data can be used, for example, to map the XY position of the user, and may be part of the basis upon which the processor 202 grants the first or second level of access.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Image Input (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
- Studio Devices (AREA)
Abstract
Description
- The present disclosure is related generally to user authentication techniques on electronic devices.
- Although the potential advantages of using biometric authentication over traditional personal identification number (“PIN”) authentication have long been understood, its use in consumer electronic devices has only recently become popular. With biometric authentication, a user does not need to enter a PIN and, under the right conditions, does not even need to touch the device in order to unlock it.
- Most existing biometric authentication schemes use the same basic access logic that traditional PIN-based systems use. That is, a user is either authenticated or is not. The user either gains full access or no access. Furthermore, they generally do not adjust in real-time for dynamic conditions such as the movement and position of the user.
- While the appended claims set forth the features of the present techniques with particularity, these techniques, together with their objects and advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which:
-
FIG. 1A is a front view of an electronic device according to an embodiment; -
FIG. 1B is a rear view of an electronic device according to an embodiment; -
FIG. 2 is a block diagram of the electronic device according to an embodiment; -
FIG. 3 is a diagrammatic view of a scenario in which the electronic device may be used; -
FIG. 4 is a process flow diagram of a method that may be carried out in an embodiment; -
FIG. 5 is a diagrammatic view of another scenario in which the electronic device may be used; and -
FIG. 6 is a process flow diagram of a method that may be carried out in another embodiment. - According to various embodiments of the disclosure, an electronic device (also referred to as “the device”) is able to alter one or more settings of its imager (e.g., its camera) based on the motion of a user that the device is attempting to authenticate. In an embodiment, the device captures a first set of image data of the user (e.g., a moving video or still image of the user), alters a setting of the imager based on the motion, captures a second set of image data of the user, and authenticates the user based on the second set of image data.
- According to an embodiment of the disclosure, the device grants the user a first level of access to the device based on the first set of image data and grants the user second level of access to the device based on the second set of image data. The number of possible access levels is not limited, and the example of two levels discussed herein is only meant to be illustrative. Additionally, the electronic device may capture the two sets of image data with two different imagers, stitch the sets of image data together, and carry out authentication on the stitched sets of image data. The number of imagers that may be used is not limited to two, however.
- Turning to
FIG. 1A andFIG. 1B , an embodiment of the electronic device (“the device”), generally labeled 100, includes ahousing 102 having afront side 104 and arear side 106. Set along the perimeter of the housing are afirst imager 110A, asecond imager 110B, athird imager 110C, and afourth imager 110D. Each of the first through fourth imagers has a field of view that extends outwardly from the perimeter of thedevice 100. Also set along the perimeter of thedevice 100 are afirst motion sensor 116A, asecond motion sensor 116B, athird motion sensor 116C, and afourth motion sensor 116D. Each motion sensor is configured to sense motion external todevice 100. Each motion sensor may be implemented as a passive infrared detector, such as a digital thermopile sensor, or as an active sensor that uses reflected light of a light source of thedevice 100. - Set within the
front side 104 of thehousing 102 is a display 108 (e.g., an organic light-emitting diode display) and afifth imager 110E (e.g., a front facing camera). Set within therear side 106 of thehousing 102 is asixth imager 110F (e.g., a rear facing camera). Although depicted inFIGS. 1A and 1B as a smartphone, theelectronic device 100 may be implemented as other types of devices, including a tablet computer, portable gaming device, and a wearable device (e.g., a smart watch). - Turning to
FIG. 2 , an embodiment of theelectronic device 100 includes aprocessor 202, network communication hardware 204 (e.g., WiFI chip or a cellular baseband chipset), an audio output 206 (e.g., a speaker), a memory 208 (which can be implemented as volatile memory or non-volatile memory), and a light source 212 (e.g., an infrared light-emitting diode). In various embodiments, theprocessor 202 retrieves instructions and data from thememory 208 and, using the instructions and data, carries out the methods described herein. Each of the elements ofFIG. 2 (including the elements ofFIGS. 1A and 1B that appear inFIG. 2 ) is communicatively linked to one or more other elements via one ormore data pathways 226. Possible implementations of thedata pathways 226 include wires, conductive pathways on a microchip, and wireless connections. Possible implementations of theprocessor 202 include a microprocessor and a controller. - Turning to
FIG. 3 and to the flowchart ofFIG. 4 , a procedure that thedevice 100 carries out to authenticate a user in an embodiment will now be described. As shown inFIG. 3 , theelectronic device 100 is lying on a table in aroom 304. Auser 302 of the device enters theroom 104 at position A and is moving. When the user is at position A, thefirst motion sensor 116A detects theuser 302 and provides data regarding the user to the processor 202 (FIG. 2 ), including data regarding the user's position, motion (including the user's gait), speed, and context. In response to receiving the data, theprocessor 202 turns on thefirst imager 110A and controls thefirst imager 110A to capture a first set of image data (i.e., a still image, multiple still images, or multiple images organized as a moving image) of the user 302 (block 402) and provides the first set of image data to theprocessor 202. Theprocessor 202 attempts to authenticate theuser 302 using the first set of image data. For example, theprocessor 202 may attempt to authenticate theuser 302 based on biometric data, such as the user's body geometry (e.g., the user's body shape, gender, height, girth, and gait). Thus, if theprocessor 202 knows that an authorized user is a tall male, and the image data indicates that theuser 302 is a tall male, then theprocessor 202 will determine that it is possible that theuser 302 is the authorized user. Conversely, if the image data indicates that theuser 302 is a short female, then the authentication will fail. - In this scenario, the
processor 202 determines, with at least a 50% confidence level (based on its authentication attempt with the first set of image data) that theuser 302 is an authorized user. Based on this determination, theprocessor 202 grants the user 302 a first level of access to thedevice 100. The first level of access may involve granting theuser 302 access to telephone functions or lower security applications of thedevice 100. For example, theprocessor 202 may control theaudio output 206 to inform thatuser 302 that “You missed two phone calls and have one voicemail.” Theprocessor 202 may also control thedisplay 108 to display the user's access level (e.g., “You are now able to access the phone functions”). - The
processor 202 continues to receive data (position, motion, speed, and context) from thefirst motion sensor 116A. Theprocessor 202 analyzes the data from thefirst motion sensor 116A. Atblock 404, theprocessor 202 alters a setting of thefirst imager 116A based on the detected motion. For example, theprocessor 202 may determine, based on the detected motion, that theuser 302 is moving at or above a certain speed threshold (e.g., 3 feet per second), and, based on this fact, may increase the frame rate of thefirst imager 110A (e.g., from 20 frames per second (“fps”) to 50 fps). This increase in frame rate allows thefirst imager 110A to obtain more detail about the user in order to compensate for the fact that theuser 302 is now in motion or is now moving faster. Other ways that theprocessor 202 can alter a setting of thefirst imager 110A include controlling thefirst imager 110A to change one or more of its shutter speed, shutter timing, illumination setting, resolution, aperture, and zoom setting. In various embodiments, any or all of these changes may be triggered by the same motion sensor that prompted theprocessor 202 to turn on thefirst imager 202. - After the
processor 202 alters the setting, theprocessor 202 controls thefirst imager 110A to capture a second set of image data of the user 302 (block 406) and provide the second set of image data to theprocessor 202. For example, theprocessor 202 may receive a second moving video of the user from thefirst imager 110A, this time at the higher frame rate. - In this example, it is assumed that the
processor 202 is able to use the second set of image data (e.g., the second, higher-frame-rate moving video) to authenticate the user 302 (block 408). For example, theprocessor 202 may authenticate theuser 302 with a high enough confidence level to grant the user 302 a second level of access. The processor 214 grants theuser 302 the second level of access to thedevice 100 based on the second set of image data. Granting the second level of access may involve theprocessor 202 granting theuser 302 access to one or more of pictures, files, emails, or higher security applications on thedevice 100. Theprocessor 202 may also control thedisplay 108 to display the user's access level (e.g., “You are now able to access email”). - In another embodiment, the
device 100 uses multiple imagers to gradually authenticate a user. Referring toFIGS. 5 and 6 , a procedure for doing so will now be described. - As shown in
FIG. 5 , theelectronic device 100 is lying on a table in aroom 504. Auser 502 of the device enters theroom 504 at position A and is moving. When the user is at position A, thefirst motion sensor 116A detects theuser 502 and provides data regarding the user, such as the user's position, motion (including the user's gait), speed, and context, to the processor 202 (FIG. 2 ). In response to receiving the data, theprocessor 202 turns on thefirst imager 110A and controls thefirst imager 110A to capture a first set of image data of the user 302 (block 602) and provides the first set of image data to theprocessor 202. Theprocessor 202 attempts to authenticate theuser 502 using the first set of image data. In this scenario, theprocessor 202 determines, with at least a 50% confidence level based on its authentication attempt with the image data that theuser 502 is an authorized user. Based on this determination, theprocessor 202 grants the user 502 a first level of access to the device 100 (block 604). - The
processor 202 then receives data regarding the user, including the user's position, motion (including the user's gait), speed, and context, from thesecond motion sensor 116B. Theprocessor 202 analyzes the data from thesecond motion sensor 116B and, based on this motion data (and possibly based on further data from thefirst motion sensor 116A) determines that theuser 502 has moved within viewing range of thesecond imager 110B. Theprocessor 202 reacts by turning on thesecond imager 110B and controlling thesecond imager 110B to capture a second set of image data of the user 502 (block 606). Thecontroller 202 then stitches the first set of image data and the second set of image data together (block 608). This stitching process allows theprocessor 202 to get a more comprehensive view of theuser 502 and attempt to authenticate theuser 502 on that basis. Atblock 610, theprocessor 202 grants the user 502 a second level of access to theelectronic device 100 based on the stitched first and second sets of image data. In doing so, theprocessor 202 may also use the stitched images to assess the environment surrounding thedevice 100—such as the walls, ceiling, room settings, and table—and grant a level access to the user if theprocessor 202 determines that the environment is specific to the user (the user's house, office, car, etc.) Theprocessor 202 can also use the surrounding environment to reinforce the biometric data (i.e., the user's gait, etc.) collected regarding the user. In this scenario, the combination of the environmental authentication and the biometric authentication is enough for theprocessor 202 to raise the level of access from a first level to a second level atblock 610. - The process described in conjunction with
FIG. 6 is not limited to two imagers. For example, if theuser 502 continued to walk around thedevice 100, the third andfourth motion sensors processor 202. Theprocessor 202 could react by activating thethird imager 110C and thefourth imager 110D, respectively, control the imagers to capture third and fourth sets of video data, and perform stitching (and possibly environmental analysis) in order to grant the second level of access, or even to grant further levels of access. - Furthermore, the process described in conjunction with
FIG. 6 may also be carried out with sensors of thedevice 100, such as themotion sensors 116A-116D. For example, as the user walks around thedevice 100, theprocessor 202 may stitch the data from thefirst motion sensor 116A and thesecond motion sensor 116B together. The stitched data can be used, for example, to map the XY position of the user, and may be part of the basis upon which theprocessor 202 grants the first or second level of access. - It should be understood that the embodiments described herein should be considered in a descriptive sense only and not for purposes of limitation. Descriptions of features or aspects within each embodiment should typically be considered as available for other similar features or aspects in other embodiments.
- While one or more embodiments of the have been described with reference to the figures, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from their spirit and scope of as defined by the following claims. For example, the steps of the flow diagrams of
FIGS. 4 and 6 can be reordered in way that will be apparent to those of skill in the art. Steps may also be added to the flow diagrams ofFIGS. 4 and 6 without departing from the spirit of the disclosure.
Claims (16)
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/276,107 US9710629B2 (en) | 2014-05-13 | 2014-05-13 | Electronic device with method for controlling access to same |
KR1020167034208A KR102253098B1 (en) | 2014-05-13 | 2015-05-13 | Electronic device and method for controlling access to same |
EP15726444.1A EP3143545B1 (en) | 2014-05-13 | 2015-05-13 | Electronic device with method for controlling access to the same |
PCT/US2015/030527 WO2015175634A1 (en) | 2014-05-13 | 2015-05-13 | Electronic device and method for controlling access to same |
CN201580024496.9A CN106464679B (en) | 2014-05-13 | 2015-05-13 | Electronic device and method for controlling access thereto |
AU2015259277A AU2015259277B2 (en) | 2014-05-13 | 2015-05-13 | Electronic device and method for controlling access to same |
CN202110023106.3A CN112887269B (en) | 2014-05-13 | 2015-05-13 | Electronic device and method for controlling access thereto |
US15/618,427 US10255417B2 (en) | 2014-05-13 | 2017-06-09 | Electronic device with method for controlling access to same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/276,107 US9710629B2 (en) | 2014-05-13 | 2014-05-13 | Electronic device with method for controlling access to same |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/618,427 Continuation US10255417B2 (en) | 2014-05-13 | 2017-06-09 | Electronic device with method for controlling access to same |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150332032A1 true US20150332032A1 (en) | 2015-11-19 |
US9710629B2 US9710629B2 (en) | 2017-07-18 |
Family
ID=53276281
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/276,107 Active 2034-05-31 US9710629B2 (en) | 2014-05-13 | 2014-05-13 | Electronic device with method for controlling access to same |
US15/618,427 Active US10255417B2 (en) | 2014-05-13 | 2017-06-09 | Electronic device with method for controlling access to same |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/618,427 Active US10255417B2 (en) | 2014-05-13 | 2017-06-09 | Electronic device with method for controlling access to same |
Country Status (6)
Country | Link |
---|---|
US (2) | US9710629B2 (en) |
EP (1) | EP3143545B1 (en) |
KR (1) | KR102253098B1 (en) |
CN (2) | CN106464679B (en) |
AU (1) | AU2015259277B2 (en) |
WO (1) | WO2015175634A1 (en) |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160147063A1 (en) * | 2014-11-26 | 2016-05-26 | Osterhout Group, Inc. | See-through computer display systems |
US20170134645A1 (en) * | 2015-11-10 | 2017-05-11 | Samsung Electronics Co., Ltd. | Wearable device and control method thereof |
US9651783B2 (en) | 2014-01-21 | 2017-05-16 | Osterhout Group, Inc. | See-through computer display systems |
US9651788B2 (en) | 2014-01-21 | 2017-05-16 | Osterhout Group, Inc. | See-through computer display systems |
US9651787B2 (en) | 2014-04-25 | 2017-05-16 | Osterhout Group, Inc. | Speaker assembly for headworn computer |
US9684172B2 (en) | 2014-12-03 | 2017-06-20 | Osterhout Group, Inc. | Head worn computer display systems |
USD792400S1 (en) | 2014-12-31 | 2017-07-18 | Osterhout Group, Inc. | Computer glasses |
US9720241B2 (en) | 2014-06-09 | 2017-08-01 | Osterhout Group, Inc. | Content presentation in head worn computing |
US9720234B2 (en) | 2014-01-21 | 2017-08-01 | Osterhout Group, Inc. | See-through computer display systems |
US9740280B2 (en) | 2014-01-21 | 2017-08-22 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US9746686B2 (en) | 2014-05-19 | 2017-08-29 | Osterhout Group, Inc. | Content position calibration in head worn computing |
US9753288B2 (en) | 2014-01-21 | 2017-09-05 | Osterhout Group, Inc. | See-through computer display systems |
US9766463B2 (en) | 2014-01-21 | 2017-09-19 | Osterhout Group, Inc. | See-through computer display systems |
US9772492B2 (en) | 2014-01-21 | 2017-09-26 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US9784973B2 (en) | 2014-02-11 | 2017-10-10 | Osterhout Group, Inc. | Micro doppler presentations in head worn computing |
US9811152B2 (en) | 2014-01-21 | 2017-11-07 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US9829707B2 (en) | 2014-08-12 | 2017-11-28 | Osterhout Group, Inc. | Measuring content brightness in head worn computing |
US9836122B2 (en) | 2014-01-21 | 2017-12-05 | Osterhout Group, Inc. | Eye glint imaging in see-through computer display systems |
US9843093B2 (en) | 2014-02-11 | 2017-12-12 | Osterhout Group, Inc. | Spatial location presentation in head worn computing |
US9841599B2 (en) | 2014-06-05 | 2017-12-12 | Osterhout Group, Inc. | Optical configurations for head-worn see-through displays |
US9852545B2 (en) | 2014-02-11 | 2017-12-26 | Osterhout Group, Inc. | Spatial location presentation in head worn computing |
US9928019B2 (en) | 2014-02-14 | 2018-03-27 | Osterhout Group, Inc. | Object shadowing in head worn computing |
US9939934B2 (en) | 2014-01-17 | 2018-04-10 | Osterhout Group, Inc. | External user interface for head worn computing |
US9965681B2 (en) | 2008-12-16 | 2018-05-08 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US10001644B2 (en) | 2014-01-21 | 2018-06-19 | Osterhout Group, Inc. | See-through computer display systems |
US10062182B2 (en) | 2015-02-17 | 2018-08-28 | Osterhout Group, Inc. | See-through computer display systems |
US10133304B2 (en) * | 2015-05-26 | 2018-11-20 | Motorola Mobility Llc | Portable electronic device proximity sensors and mode switching functionality |
US10191279B2 (en) | 2014-03-17 | 2019-01-29 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US10255417B2 (en) | 2014-05-13 | 2019-04-09 | Google Technology Holdings LLC | Electronic device with method for controlling access to same |
US10254856B2 (en) | 2014-01-17 | 2019-04-09 | Osterhout Group, Inc. | External user interface for head worn computing |
US10558420B2 (en) | 2014-02-11 | 2020-02-11 | Mentor Acquisition One, Llc | Spatial location presentation in head worn computing |
US10591728B2 (en) | 2016-03-02 | 2020-03-17 | Mentor Acquisition One, Llc | Optical systems for head-worn computers |
US10649220B2 (en) | 2014-06-09 | 2020-05-12 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US10663740B2 (en) | 2014-06-09 | 2020-05-26 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US10667981B2 (en) | 2016-02-29 | 2020-06-02 | Mentor Acquisition One, Llc | Reading assistance system for visually impaired |
US10684687B2 (en) | 2014-12-03 | 2020-06-16 | Mentor Acquisition One, Llc | See-through computer display systems |
US10853589B2 (en) | 2014-04-25 | 2020-12-01 | Mentor Acquisition One, Llc | Language translation with head-worn computing |
US10878775B2 (en) | 2015-02-17 | 2020-12-29 | Mentor Acquisition One, Llc | See-through computer display systems |
US10909225B2 (en) | 2018-09-17 | 2021-02-02 | Motorola Mobility Llc | Electronic devices and corresponding methods for precluding entry of authentication codes in multi-person environments |
US11103122B2 (en) | 2014-07-15 | 2021-08-31 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11104272B2 (en) | 2014-03-28 | 2021-08-31 | Mentor Acquisition One, Llc | System for assisted operator safety using an HMD |
US11269182B2 (en) | 2014-07-15 | 2022-03-08 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US20220089092A1 (en) * | 2020-09-23 | 2022-03-24 | Gentex Corporation | Mirror assembly with passenger camera |
US11487110B2 (en) | 2014-01-21 | 2022-11-01 | Mentor Acquisition One, Llc | Eye imaging in head worn computing |
US11669163B2 (en) | 2014-01-21 | 2023-06-06 | Mentor Acquisition One, Llc | Eye glint imaging in see-through computer display systems |
US11892644B2 (en) | 2014-01-21 | 2024-02-06 | Mentor Acquisition One, Llc | See-through computer display systems |
US12093453B2 (en) | 2014-01-21 | 2024-09-17 | Mentor Acquisition One, Llc | Eye glint imaging in see-through computer display systems |
US12112089B2 (en) | 2014-02-11 | 2024-10-08 | Mentor Acquisition One, Llc | Spatial location presentation in head worn computing |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20160109586A (en) * | 2015-03-12 | 2016-09-21 | 삼성전자주식회사 | Image processing system and mobile computing device including the same |
EP3271853A1 (en) * | 2015-03-17 | 2018-01-24 | Microsoft Technology Licensing, LLC | Selectively providing personal information and access to functionality on lock screen based on biometric user authentication |
WO2019182562A1 (en) * | 2018-03-20 | 2019-09-26 | Hewlett-Packard Development Company, L.P. | Sensors access control |
Citations (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6278884B1 (en) * | 1997-03-07 | 2001-08-21 | Ki Il Kim | Portable information communication device |
US20020109863A1 (en) * | 1998-01-12 | 2002-08-15 | Monroe David A. | Apparatus for capturing, converting and transmitting a visual image signal via a digital transmission system |
US20060081771A1 (en) * | 2004-10-18 | 2006-04-20 | Ixi Mobile (R&D) Ltd. | Motion sensitive illumination system and method for a mobile computing device |
US20070168677A1 (en) * | 2005-12-27 | 2007-07-19 | International Business Machines Corporation | Changing user authentication method by timer and the user context |
US20080220809A1 (en) * | 2007-03-07 | 2008-09-11 | Sony Ericsson Mobile Communications Ab | Method and system for a self timer function for a camera and ... |
US20090083847A1 (en) * | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
US20090088204A1 (en) * | 2007-10-01 | 2009-04-02 | Apple Inc. | Movement-based interfaces for personal media device |
US20100299530A1 (en) * | 2009-02-26 | 2010-11-25 | Bell Robert E | User authentication system and method |
US20110037866A1 (en) * | 2009-08-12 | 2011-02-17 | Kabushiki Kaisha Toshiba | Mobile apparatus |
US20120046012A1 (en) * | 2010-08-17 | 2012-02-23 | Qualcomm Incorporated | Mobile Device Having Increased Security That Is Less Obtrusive |
US20120287035A1 (en) * | 2011-05-12 | 2012-11-15 | Apple Inc. | Presence Sensing |
US20120287031A1 (en) * | 2011-05-12 | 2012-11-15 | Apple Inc. | Presence sensing |
US20120315016A1 (en) * | 2011-06-12 | 2012-12-13 | Hei Tao Fung | Multi-Purpose Image and Video Capturing Device |
US20130267204A1 (en) * | 2012-02-28 | 2013-10-10 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication based on different device capture modalities |
US20130322705A1 (en) * | 2012-05-30 | 2013-12-05 | Google Inc. | Facial and fingerprint authentication |
US20130326613A1 (en) * | 2012-05-31 | 2013-12-05 | Gregory Peter Kochanski | Dynamic control of device unlocking security level |
US8646060B1 (en) * | 2013-07-30 | 2014-02-04 | Mourad Ben Ayed | Method for adaptive authentication using a mobile device |
US20140059673A1 (en) * | 2005-06-16 | 2014-02-27 | Sensible Vision, Inc. | System and Method for Disabling Secure Access to an Electronic Device Using Detection of a Unique Motion |
US20140089243A1 (en) * | 2012-01-08 | 2014-03-27 | Steven Charles Oppenheimer | System and Method For Item Self-Assessment As Being Extant or Displaced |
US20140123275A1 (en) * | 2012-01-09 | 2014-05-01 | Sensible Vision, Inc. | System and method for disabling secure access to an electronic device using detection of a predetermined device orientation |
US20140130127A1 (en) * | 2012-11-07 | 2014-05-08 | Fmr Llc | Risk Adjusted, Multifactor Authentication |
US20140197922A1 (en) * | 2013-01-16 | 2014-07-17 | Cygnus Broadband, Inc. | System and method for positive identification on a mobile device |
US20140230047A1 (en) * | 2012-12-07 | 2014-08-14 | Chamtech Technologies Incorporated | Techniques for biometric authentication of user of mobile device |
US20140250523A1 (en) * | 2012-10-11 | 2014-09-04 | Carnegie Mellon University | Continuous Authentication, and Methods, Systems, and Software Therefor |
US20140289834A1 (en) * | 2013-03-22 | 2014-09-25 | Rolf Lindemann | System and method for eye tracking during authentication |
US20140337949A1 (en) * | 2013-05-13 | 2014-11-13 | Hoyos Labs Corp. | System and method for generating a biometric identifier |
US20140366128A1 (en) * | 2013-05-30 | 2014-12-11 | Vinky P. Venkateswaran | Adaptive authentication systems and methods |
US20150026797A1 (en) * | 2013-07-19 | 2015-01-22 | Fu Tai Hua Industry (Shenzhen) Co., Ltd. | Electronic device and authentication system therein and method |
US20150067823A1 (en) * | 2013-08-28 | 2015-03-05 | Geoffrey W. Chatterton | Motion-based credentials using magnified motion |
US8983207B1 (en) * | 2013-01-10 | 2015-03-17 | Intuit Inc. | Mitigating replay attacks using multiple-image authentication |
US20150347732A1 (en) * | 2014-05-29 | 2015-12-03 | Google Technology Holdings LLC | Electronic Device and Method for Controlling Access to Same |
US20160071111A1 (en) * | 2012-01-13 | 2016-03-10 | Amazon Technologies, Inc. | Image analysis for user authentication |
US20160203306A1 (en) * | 2013-09-09 | 2016-07-14 | Apple Inc. | Background Enrollment and Authentication of a User |
US20160226865A1 (en) * | 2015-01-29 | 2016-08-04 | AirSig Technology Co. Ltd. | Motion based authentication systems and methods |
US20170032114A1 (en) * | 2010-11-29 | 2017-02-02 | Biocatch Ltd. | System, method, and device of detecting identity of a user and authenticating a user |
Family Cites Families (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6707487B1 (en) * | 1998-11-20 | 2004-03-16 | In The Play, Inc. | Method for representing real-time motion |
US7193652B2 (en) * | 1999-08-17 | 2007-03-20 | Applied Vision Systems, Inc. | Dynamic range video recording and playback system and method |
JP2002197437A (en) | 2000-12-27 | 2002-07-12 | Sony Corp | Walking detection system, walking detector, device and walking detecting method |
US20030053662A1 (en) * | 2001-09-19 | 2003-03-20 | Koninklijke Philips Electronics N.V. | Method and apparatus for digital encoding and operator identification using stored user image |
SE525304C2 (en) * | 2002-04-22 | 2005-01-25 | Snalle Ab | Method and apparatus for controlling access between a computer and a communication network |
US20050232470A1 (en) | 2004-03-31 | 2005-10-20 | Ibm Corporation | Method and apparatus for determining the identity of a user by narrowing down from user groups |
US7840308B2 (en) | 2004-09-10 | 2010-11-23 | Honda Motor Co., Ltd. | Robot device control based on environment and position of a movable robot |
US8079079B2 (en) * | 2005-06-29 | 2011-12-13 | Microsoft Corporation | Multimodal authentication |
BRPI0618195A2 (en) * | 2005-11-03 | 2011-08-23 | Barry Stuecker | security system |
JP4367424B2 (en) | 2006-02-21 | 2009-11-18 | 沖電気工業株式会社 | Personal identification device and personal identification method |
US7903168B2 (en) * | 2006-04-06 | 2011-03-08 | Eastman Kodak Company | Camera and method with additional evaluation image capture based on scene brightness changes |
US20070286596A1 (en) * | 2006-06-08 | 2007-12-13 | Lonn Fredrik A | Method and system for adjusting camera settings in a camera equipped mobile radio terminal |
US8953849B2 (en) * | 2007-04-19 | 2015-02-10 | Eyelock, Inc. | Method and system for biometric recognition |
JP5326527B2 (en) * | 2008-11-28 | 2013-10-30 | 富士通株式会社 | Authentication apparatus and authentication method |
AU2010221722A1 (en) * | 2009-02-06 | 2011-08-18 | Oculis Labs, Inc. | Video-based privacy supporting system |
US8477175B2 (en) * | 2009-03-09 | 2013-07-02 | Cisco Technology, Inc. | System and method for providing three dimensional imaging in a network environment |
US8111247B2 (en) * | 2009-03-27 | 2012-02-07 | Sony Ericsson Mobile Communications Ab | System and method for changing touch screen functionality |
CN102404510B (en) * | 2009-06-16 | 2015-07-01 | 英特尔公司 | Camera applications in handheld device |
GB2483168B (en) * | 2009-10-13 | 2013-06-12 | Pointgrab Ltd | Computer vision gesture based control of a device |
FR2961621B1 (en) * | 2010-06-22 | 2014-09-05 | Arjowiggins Security | METHOD OF AUTHENTICATING AND / OR IDENTIFYING A SECURITY ARTICLE |
KR20120010764A (en) * | 2010-07-27 | 2012-02-06 | 엘지전자 주식회사 | MOBILE TERMINAL AND METHOD FOR CONTROLLING A THREE DIMENSION IMAGE in thereof |
US9661232B2 (en) | 2010-08-12 | 2017-05-23 | John G. Posa | Apparatus and method providing auto zoom in response to relative movement of target subject matter |
CN102137005B (en) | 2010-12-31 | 2014-04-02 | 华为技术有限公司 | Method, device and system for forwarding date in communication system |
US8994499B2 (en) * | 2011-03-16 | 2015-03-31 | Apple Inc. | Locking and unlocking a mobile device using facial recognition |
US8594374B1 (en) * | 2011-03-30 | 2013-11-26 | Amazon Technologies, Inc. | Secure device unlock with gaze calibration |
KR101279576B1 (en) * | 2011-06-15 | 2013-06-27 | 삼성테크윈 주식회사 | Method for generating panorama image within digital image processing apparatus |
US8693726B2 (en) * | 2011-06-29 | 2014-04-08 | Amazon Technologies, Inc. | User identification by gesture recognition |
US9082235B2 (en) * | 2011-07-12 | 2015-07-14 | Microsoft Technology Licensing, Llc | Using facial data for device authentication or subject identification |
US8839358B2 (en) * | 2011-08-31 | 2014-09-16 | Microsoft Corporation | Progressive authentication |
US8966613B2 (en) * | 2011-09-30 | 2015-02-24 | Microsoft Technology Licensing, Llc | Multi-frame depth image information identification |
CN102662554B (en) | 2012-01-09 | 2015-06-24 | 联想(北京)有限公司 | Information processing apparatus and code input mode switching method thereof |
US8984622B1 (en) * | 2012-01-17 | 2015-03-17 | Amazon Technologies, Inc. | User authentication through video analysis |
US9066125B2 (en) | 2012-02-10 | 2015-06-23 | Advanced Biometric Controls, Llc | Secure display |
US9323912B2 (en) * | 2012-02-28 | 2016-04-26 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication |
US9137246B2 (en) * | 2012-04-09 | 2015-09-15 | Brivas Llc | Systems, methods and apparatus for multivariate authentication |
US8396265B1 (en) * | 2012-06-26 | 2013-03-12 | Google Inc. | Facial recognition |
US20140013422A1 (en) * | 2012-07-03 | 2014-01-09 | Scott Janus | Continuous Multi-factor Authentication |
US8983201B2 (en) | 2012-07-30 | 2015-03-17 | Microsoft Technology Licensing, Llc | Three-dimensional visual phrases for object recognition |
US10567376B2 (en) * | 2012-08-24 | 2020-02-18 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using multifactor authentication |
US9032510B2 (en) | 2012-09-11 | 2015-05-12 | Sony Corporation | Gesture- and expression-based authentication |
US8886953B1 (en) * | 2012-09-14 | 2014-11-11 | Google Inc. | Image processing |
US20140118520A1 (en) * | 2012-10-29 | 2014-05-01 | Motorola Mobility Llc | Seamless authorized access to an electronic device |
US9166962B2 (en) * | 2012-11-14 | 2015-10-20 | Blackberry Limited | Mobile communications device providing heuristic security authentication features and related methods |
US8856541B1 (en) * | 2013-01-10 | 2014-10-07 | Google Inc. | Liveness detection |
US10152135B2 (en) | 2013-03-15 | 2018-12-11 | Intel Corporation | User interface responsive to operator position and gestures |
US20140310801A1 (en) | 2013-04-11 | 2014-10-16 | Nokia Corporation | Method and Apparatus for Performing Authentication |
US9384751B2 (en) | 2013-05-06 | 2016-07-05 | Honeywell International Inc. | User authentication of voice controlled devices |
US9760785B2 (en) * | 2013-05-08 | 2017-09-12 | Jpmorgan Chase Bank, N.A. | Systems and methods for high fidelity multi-modal out-of-band biometric authentication |
US9721175B2 (en) * | 2013-05-08 | 2017-08-01 | Jpmorgan Chase Bank, N.A. | Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage |
SG11201509969RA (en) * | 2013-06-06 | 2016-01-28 | Kustom Signals Inc | Traffic enforcement system with time tracking and integrated video capture |
US9626493B2 (en) * | 2013-06-08 | 2017-04-18 | Microsoft Technology Licensing, Llc | Continuous digital content protection |
US20150071508A1 (en) * | 2013-09-09 | 2015-03-12 | Apple Inc. | Background Enrollment and Authentication of a User |
US9147061B1 (en) * | 2013-11-22 | 2015-09-29 | Google Inc. | Multi-level authentication |
US20150177842A1 (en) * | 2013-12-23 | 2015-06-25 | Yuliya Rudenko | 3D Gesture Based User Authorization and Device Control Methods |
CN103744506A (en) * | 2013-12-26 | 2014-04-23 | 乐视致新电子科技(天津)有限公司 | Electronic device and gesture unlocking method |
US20150186628A1 (en) * | 2013-12-27 | 2015-07-02 | Isabel F. Bush | Authentication with an electronic device |
CN103761463B (en) | 2014-01-13 | 2017-09-01 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
US9600304B2 (en) * | 2014-01-23 | 2017-03-21 | Apple Inc. | Device configuration for multiple users using remote user biometrics |
US9760383B2 (en) * | 2014-01-23 | 2017-09-12 | Apple Inc. | Device configuration with multiple profiles for a single user using remote user biometrics |
US9710691B1 (en) * | 2014-01-23 | 2017-07-18 | Diamond Fortress Technologies, Inc. | Touchless fingerprint matching systems and methods |
US9747428B2 (en) * | 2014-01-30 | 2017-08-29 | Qualcomm Incorporated | Dynamic keyboard and touchscreen biometrics |
US20150220931A1 (en) * | 2014-01-31 | 2015-08-06 | Apple Inc. | Use of a Biometric Image for Authorization |
US9552684B2 (en) * | 2014-02-04 | 2017-01-24 | Secure Gravity Inc. | Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control |
US9510196B2 (en) * | 2014-03-17 | 2016-11-29 | Qualcomm Incorporated | Method and apparatus for authenticating a user on a mobile device |
US9710629B2 (en) | 2014-05-13 | 2017-07-18 | Google Technology Holdings LLC | Electronic device with method for controlling access to same |
US9408076B2 (en) * | 2014-05-14 | 2016-08-02 | The Regents Of The University Of California | Sensor-assisted biometric authentication for smartphones |
-
2014
- 2014-05-13 US US14/276,107 patent/US9710629B2/en active Active
-
2015
- 2015-05-13 CN CN201580024496.9A patent/CN106464679B/en active Active
- 2015-05-13 CN CN202110023106.3A patent/CN112887269B/en active Active
- 2015-05-13 AU AU2015259277A patent/AU2015259277B2/en active Active
- 2015-05-13 EP EP15726444.1A patent/EP3143545B1/en active Active
- 2015-05-13 WO PCT/US2015/030527 patent/WO2015175634A1/en active Application Filing
- 2015-05-13 KR KR1020167034208A patent/KR102253098B1/en active IP Right Grant
-
2017
- 2017-06-09 US US15/618,427 patent/US10255417B2/en active Active
Patent Citations (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6278884B1 (en) * | 1997-03-07 | 2001-08-21 | Ki Il Kim | Portable information communication device |
US20020109863A1 (en) * | 1998-01-12 | 2002-08-15 | Monroe David A. | Apparatus for capturing, converting and transmitting a visual image signal via a digital transmission system |
US20060081771A1 (en) * | 2004-10-18 | 2006-04-20 | Ixi Mobile (R&D) Ltd. | Motion sensitive illumination system and method for a mobile computing device |
US20140059673A1 (en) * | 2005-06-16 | 2014-02-27 | Sensible Vision, Inc. | System and Method for Disabling Secure Access to an Electronic Device Using Detection of a Unique Motion |
US20070168677A1 (en) * | 2005-12-27 | 2007-07-19 | International Business Machines Corporation | Changing user authentication method by timer and the user context |
US20080220809A1 (en) * | 2007-03-07 | 2008-09-11 | Sony Ericsson Mobile Communications Ab | Method and system for a self timer function for a camera and ... |
US20090083847A1 (en) * | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
US20090088204A1 (en) * | 2007-10-01 | 2009-04-02 | Apple Inc. | Movement-based interfaces for personal media device |
US20100299530A1 (en) * | 2009-02-26 | 2010-11-25 | Bell Robert E | User authentication system and method |
US20110037866A1 (en) * | 2009-08-12 | 2011-02-17 | Kabushiki Kaisha Toshiba | Mobile apparatus |
US20120046012A1 (en) * | 2010-08-17 | 2012-02-23 | Qualcomm Incorporated | Mobile Device Having Increased Security That Is Less Obtrusive |
US20170032114A1 (en) * | 2010-11-29 | 2017-02-02 | Biocatch Ltd. | System, method, and device of detecting identity of a user and authenticating a user |
US20120287035A1 (en) * | 2011-05-12 | 2012-11-15 | Apple Inc. | Presence Sensing |
US20120287031A1 (en) * | 2011-05-12 | 2012-11-15 | Apple Inc. | Presence sensing |
US20120315016A1 (en) * | 2011-06-12 | 2012-12-13 | Hei Tao Fung | Multi-Purpose Image and Video Capturing Device |
US20140089243A1 (en) * | 2012-01-08 | 2014-03-27 | Steven Charles Oppenheimer | System and Method For Item Self-Assessment As Being Extant or Displaced |
US20140123275A1 (en) * | 2012-01-09 | 2014-05-01 | Sensible Vision, Inc. | System and method for disabling secure access to an electronic device using detection of a predetermined device orientation |
US9519769B2 (en) * | 2012-01-09 | 2016-12-13 | Sensible Vision, Inc. | System and method for disabling secure access to an electronic device using detection of a predetermined device orientation |
US20160071111A1 (en) * | 2012-01-13 | 2016-03-10 | Amazon Technologies, Inc. | Image analysis for user authentication |
US20130267204A1 (en) * | 2012-02-28 | 2013-10-10 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication based on different device capture modalities |
US20130322705A1 (en) * | 2012-05-30 | 2013-12-05 | Google Inc. | Facial and fingerprint authentication |
US20130326613A1 (en) * | 2012-05-31 | 2013-12-05 | Gregory Peter Kochanski | Dynamic control of device unlocking security level |
US20140250523A1 (en) * | 2012-10-11 | 2014-09-04 | Carnegie Mellon University | Continuous Authentication, and Methods, Systems, and Software Therefor |
US20140130127A1 (en) * | 2012-11-07 | 2014-05-08 | Fmr Llc | Risk Adjusted, Multifactor Authentication |
US20140230047A1 (en) * | 2012-12-07 | 2014-08-14 | Chamtech Technologies Incorporated | Techniques for biometric authentication of user of mobile device |
US8983207B1 (en) * | 2013-01-10 | 2015-03-17 | Intuit Inc. | Mitigating replay attacks using multiple-image authentication |
US20140197922A1 (en) * | 2013-01-16 | 2014-07-17 | Cygnus Broadband, Inc. | System and method for positive identification on a mobile device |
US20140289834A1 (en) * | 2013-03-22 | 2014-09-25 | Rolf Lindemann | System and method for eye tracking during authentication |
US20140337949A1 (en) * | 2013-05-13 | 2014-11-13 | Hoyos Labs Corp. | System and method for generating a biometric identifier |
US20140366128A1 (en) * | 2013-05-30 | 2014-12-11 | Vinky P. Venkateswaran | Adaptive authentication systems and methods |
US20150026797A1 (en) * | 2013-07-19 | 2015-01-22 | Fu Tai Hua Industry (Shenzhen) Co., Ltd. | Electronic device and authentication system therein and method |
US8646060B1 (en) * | 2013-07-30 | 2014-02-04 | Mourad Ben Ayed | Method for adaptive authentication using a mobile device |
US20150067823A1 (en) * | 2013-08-28 | 2015-03-05 | Geoffrey W. Chatterton | Motion-based credentials using magnified motion |
US20160203306A1 (en) * | 2013-09-09 | 2016-07-14 | Apple Inc. | Background Enrollment and Authentication of a User |
US20150347732A1 (en) * | 2014-05-29 | 2015-12-03 | Google Technology Holdings LLC | Electronic Device and Method for Controlling Access to Same |
US20160226865A1 (en) * | 2015-01-29 | 2016-08-04 | AirSig Technology Co. Ltd. | Motion based authentication systems and methods |
Non-Patent Citations (1)
Title |
---|
Chetty et al., Multimedia Sensor Fusion for Retrieving Identity in Biometric Access Control Systems, November 2010, ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 6, No. 4, Article 26, Pg. 1-21 * |
Cited By (104)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9965681B2 (en) | 2008-12-16 | 2018-05-08 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US11782529B2 (en) | 2014-01-17 | 2023-10-10 | Mentor Acquisition One, Llc | External user interface for head worn computing |
US10254856B2 (en) | 2014-01-17 | 2019-04-09 | Osterhout Group, Inc. | External user interface for head worn computing |
US11169623B2 (en) | 2014-01-17 | 2021-11-09 | Mentor Acquisition One, Llc | External user interface for head worn computing |
US12045401B2 (en) | 2014-01-17 | 2024-07-23 | Mentor Acquisition One, Llc | External user interface for head worn computing |
US9939934B2 (en) | 2014-01-17 | 2018-04-10 | Osterhout Group, Inc. | External user interface for head worn computing |
US11231817B2 (en) | 2014-01-17 | 2022-01-25 | Mentor Acquisition One, Llc | External user interface for head worn computing |
US11507208B2 (en) | 2014-01-17 | 2022-11-22 | Mentor Acquisition One, Llc | External user interface for head worn computing |
US9720234B2 (en) | 2014-01-21 | 2017-08-01 | Osterhout Group, Inc. | See-through computer display systems |
US11892644B2 (en) | 2014-01-21 | 2024-02-06 | Mentor Acquisition One, Llc | See-through computer display systems |
US10579140B2 (en) | 2014-01-21 | 2020-03-03 | Mentor Acquisition One, Llc | Eye glint imaging in see-through computer display systems |
US9740012B2 (en) | 2014-01-21 | 2017-08-22 | Osterhout Group, Inc. | See-through computer display systems |
US9740280B2 (en) | 2014-01-21 | 2017-08-22 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US9746676B2 (en) | 2014-01-21 | 2017-08-29 | Osterhout Group, Inc. | See-through computer display systems |
US9720235B2 (en) | 2014-01-21 | 2017-08-01 | Osterhout Group, Inc. | See-through computer display systems |
US9753288B2 (en) | 2014-01-21 | 2017-09-05 | Osterhout Group, Inc. | See-through computer display systems |
US9766463B2 (en) | 2014-01-21 | 2017-09-19 | Osterhout Group, Inc. | See-through computer display systems |
US9772492B2 (en) | 2014-01-21 | 2017-09-26 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US11669163B2 (en) | 2014-01-21 | 2023-06-06 | Mentor Acquisition One, Llc | Eye glint imaging in see-through computer display systems |
US9811152B2 (en) | 2014-01-21 | 2017-11-07 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US9811159B2 (en) | 2014-01-21 | 2017-11-07 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US9829703B2 (en) | 2014-01-21 | 2017-11-28 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US11622426B2 (en) | 2014-01-21 | 2023-04-04 | Mentor Acquisition One, Llc | See-through computer display systems |
US9836122B2 (en) | 2014-01-21 | 2017-12-05 | Osterhout Group, Inc. | Eye glint imaging in see-through computer display systems |
US11619820B2 (en) | 2014-01-21 | 2023-04-04 | Mentor Acquisition One, Llc | See-through computer display systems |
US11796805B2 (en) | 2014-01-21 | 2023-10-24 | Mentor Acquisition One, Llc | Eye imaging in head worn computing |
US11487110B2 (en) | 2014-01-21 | 2022-11-01 | Mentor Acquisition One, Llc | Eye imaging in head worn computing |
US11353957B2 (en) | 2014-01-21 | 2022-06-07 | Mentor Acquisition One, Llc | Eye glint imaging in see-through computer display systems |
US9684171B2 (en) | 2014-01-21 | 2017-06-20 | Osterhout Group, Inc. | See-through computer display systems |
US9933622B2 (en) | 2014-01-21 | 2018-04-03 | Osterhout Group, Inc. | See-through computer display systems |
US11947126B2 (en) | 2014-01-21 | 2024-04-02 | Mentor Acquisition One, Llc | See-through computer display systems |
US9651788B2 (en) | 2014-01-21 | 2017-05-16 | Osterhout Group, Inc. | See-through computer display systems |
US10001644B2 (en) | 2014-01-21 | 2018-06-19 | Osterhout Group, Inc. | See-through computer display systems |
US9651783B2 (en) | 2014-01-21 | 2017-05-16 | Osterhout Group, Inc. | See-through computer display systems |
US11126003B2 (en) | 2014-01-21 | 2021-09-21 | Mentor Acquisition One, Llc | See-through computer display systems |
US11099380B2 (en) | 2014-01-21 | 2021-08-24 | Mentor Acquisition One, Llc | Eye imaging in head worn computing |
US10139632B2 (en) | 2014-01-21 | 2018-11-27 | Osterhout Group, Inc. | See-through computer display systems |
US11054902B2 (en) | 2014-01-21 | 2021-07-06 | Mentor Acquisition One, Llc | Eye glint imaging in see-through computer display systems |
US10866420B2 (en) | 2014-01-21 | 2020-12-15 | Mentor Acquisition One, Llc | See-through computer display systems |
US10698223B2 (en) | 2014-01-21 | 2020-06-30 | Mentor Acquisition One, Llc | See-through computer display systems |
US12093453B2 (en) | 2014-01-21 | 2024-09-17 | Mentor Acquisition One, Llc | Eye glint imaging in see-through computer display systems |
US9852545B2 (en) | 2014-02-11 | 2017-12-26 | Osterhout Group, Inc. | Spatial location presentation in head worn computing |
US12112089B2 (en) | 2014-02-11 | 2024-10-08 | Mentor Acquisition One, Llc | Spatial location presentation in head worn computing |
US10558420B2 (en) | 2014-02-11 | 2020-02-11 | Mentor Acquisition One, Llc | Spatial location presentation in head worn computing |
US9841602B2 (en) | 2014-02-11 | 2017-12-12 | Osterhout Group, Inc. | Location indicating avatar in head worn computing |
US11599326B2 (en) | 2014-02-11 | 2023-03-07 | Mentor Acquisition One, Llc | Spatial location presentation in head worn computing |
US9843093B2 (en) | 2014-02-11 | 2017-12-12 | Osterhout Group, Inc. | Spatial location presentation in head worn computing |
US9784973B2 (en) | 2014-02-11 | 2017-10-10 | Osterhout Group, Inc. | Micro doppler presentations in head worn computing |
US9928019B2 (en) | 2014-02-14 | 2018-03-27 | Osterhout Group, Inc. | Object shadowing in head worn computing |
US10191279B2 (en) | 2014-03-17 | 2019-01-29 | Osterhout Group, Inc. | Eye imaging in head worn computing |
US11104272B2 (en) | 2014-03-28 | 2021-08-31 | Mentor Acquisition One, Llc | System for assisted operator safety using an HMD |
US9651787B2 (en) | 2014-04-25 | 2017-05-16 | Osterhout Group, Inc. | Speaker assembly for headworn computer |
US11727223B2 (en) | 2014-04-25 | 2023-08-15 | Mentor Acquisition One, Llc | Language translation with head-worn computing |
US10853589B2 (en) | 2014-04-25 | 2020-12-01 | Mentor Acquisition One, Llc | Language translation with head-worn computing |
US11880041B2 (en) | 2014-04-25 | 2024-01-23 | Mentor Acquisition One, Llc | Speaker assembly for headworn computer |
US11474360B2 (en) | 2014-04-25 | 2022-10-18 | Mentor Acquisition One, Llc | Speaker assembly for headworn computer |
US12050884B2 (en) | 2014-04-25 | 2024-07-30 | Mentor Acquisition One, Llc | Language translation with head-worn computing |
US10634922B2 (en) | 2014-04-25 | 2020-04-28 | Mentor Acquisition One, Llc | Speaker assembly for headworn computer |
US10255417B2 (en) | 2014-05-13 | 2019-04-09 | Google Technology Holdings LLC | Electronic device with method for controlling access to same |
US9746686B2 (en) | 2014-05-19 | 2017-08-29 | Osterhout Group, Inc. | Content position calibration in head worn computing |
US11960089B2 (en) | 2014-06-05 | 2024-04-16 | Mentor Acquisition One, Llc | Optical configurations for head-worn see-through displays |
US9841599B2 (en) | 2014-06-05 | 2017-12-12 | Osterhout Group, Inc. | Optical configurations for head-worn see-through displays |
US10877270B2 (en) | 2014-06-05 | 2020-12-29 | Mentor Acquisition One, Llc | Optical configurations for head-worn see-through displays |
US11402639B2 (en) | 2014-06-05 | 2022-08-02 | Mentor Acquisition One, Llc | Optical configurations for head-worn see-through displays |
US11022810B2 (en) | 2014-06-09 | 2021-06-01 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US9720241B2 (en) | 2014-06-09 | 2017-08-01 | Osterhout Group, Inc. | Content presentation in head worn computing |
US10649220B2 (en) | 2014-06-09 | 2020-05-12 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US10663740B2 (en) | 2014-06-09 | 2020-05-26 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11887265B2 (en) | 2014-06-09 | 2024-01-30 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11790617B2 (en) | 2014-06-09 | 2023-10-17 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11663794B2 (en) | 2014-06-09 | 2023-05-30 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11327323B2 (en) | 2014-06-09 | 2022-05-10 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US10976559B2 (en) | 2014-06-09 | 2021-04-13 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US10139635B2 (en) | 2014-06-09 | 2018-11-27 | Osterhout Group, Inc. | Content presentation in head worn computing |
US11360318B2 (en) | 2014-06-09 | 2022-06-14 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11786105B2 (en) | 2014-07-15 | 2023-10-17 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11103122B2 (en) | 2014-07-15 | 2021-08-31 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11269182B2 (en) | 2014-07-15 | 2022-03-08 | Mentor Acquisition One, Llc | Content presentation in head worn computing |
US11360314B2 (en) | 2014-08-12 | 2022-06-14 | Mentor Acquisition One, Llc | Measuring content brightness in head worn computing |
US10908422B2 (en) | 2014-08-12 | 2021-02-02 | Mentor Acquisition One, Llc | Measuring content brightness in head worn computing |
US9829707B2 (en) | 2014-08-12 | 2017-11-28 | Osterhout Group, Inc. | Measuring content brightness in head worn computing |
US11630315B2 (en) | 2014-08-12 | 2023-04-18 | Mentor Acquisition One, Llc | Measuring content brightness in head worn computing |
US20160147063A1 (en) * | 2014-11-26 | 2016-05-26 | Osterhout Group, Inc. | See-through computer display systems |
US11262846B2 (en) | 2014-12-03 | 2022-03-01 | Mentor Acquisition One, Llc | See-through computer display systems |
US9684172B2 (en) | 2014-12-03 | 2017-06-20 | Osterhout Group, Inc. | Head worn computer display systems |
US10684687B2 (en) | 2014-12-03 | 2020-06-16 | Mentor Acquisition One, Llc | See-through computer display systems |
US11809628B2 (en) | 2014-12-03 | 2023-11-07 | Mentor Acquisition One, Llc | See-through computer display systems |
USD792400S1 (en) | 2014-12-31 | 2017-07-18 | Osterhout Group, Inc. | Computer glasses |
US11721303B2 (en) | 2015-02-17 | 2023-08-08 | Mentor Acquisition One, Llc | See-through computer display systems |
US10878775B2 (en) | 2015-02-17 | 2020-12-29 | Mentor Acquisition One, Llc | See-through computer display systems |
US10062182B2 (en) | 2015-02-17 | 2018-08-28 | Osterhout Group, Inc. | See-through computer display systems |
US10133304B2 (en) * | 2015-05-26 | 2018-11-20 | Motorola Mobility Llc | Portable electronic device proximity sensors and mode switching functionality |
US10205874B2 (en) * | 2015-11-10 | 2019-02-12 | Samsung Electronics Co., Ltd. | Wearable device and control method thereof |
US20170134645A1 (en) * | 2015-11-10 | 2017-05-11 | Samsung Electronics Co., Ltd. | Wearable device and control method thereof |
US10849817B2 (en) | 2016-02-29 | 2020-12-01 | Mentor Acquisition One, Llc | Providing enhanced images for navigation |
US11298288B2 (en) | 2016-02-29 | 2022-04-12 | Mentor Acquisition One, Llc | Providing enhanced images for navigation |
US11654074B2 (en) | 2016-02-29 | 2023-05-23 | Mentor Acquisition One, Llc | Providing enhanced images for navigation |
US10667981B2 (en) | 2016-02-29 | 2020-06-02 | Mentor Acquisition One, Llc | Reading assistance system for visually impaired |
US12007562B2 (en) | 2016-03-02 | 2024-06-11 | Mentor Acquisition One, Llc | Optical systems for head-worn computers |
US11592669B2 (en) | 2016-03-02 | 2023-02-28 | Mentor Acquisition One, Llc | Optical systems for head-worn computers |
US11156834B2 (en) | 2016-03-02 | 2021-10-26 | Mentor Acquisition One, Llc | Optical systems for head-worn computers |
US10591728B2 (en) | 2016-03-02 | 2020-03-17 | Mentor Acquisition One, Llc | Optical systems for head-worn computers |
US10909225B2 (en) | 2018-09-17 | 2021-02-02 | Motorola Mobility Llc | Electronic devices and corresponding methods for precluding entry of authentication codes in multi-person environments |
US20220089092A1 (en) * | 2020-09-23 | 2022-03-24 | Gentex Corporation | Mirror assembly with passenger camera |
Also Published As
Publication number | Publication date |
---|---|
KR102253098B1 (en) | 2021-05-14 |
EP3143545A1 (en) | 2017-03-22 |
CN112887269B (en) | 2022-12-27 |
AU2015259277B2 (en) | 2020-03-19 |
CN106464679A (en) | 2017-02-22 |
EP3143545B1 (en) | 2020-07-29 |
CN112887269A (en) | 2021-06-01 |
US10255417B2 (en) | 2019-04-09 |
US20170277876A1 (en) | 2017-09-28 |
AU2015259277A1 (en) | 2016-11-10 |
KR20170007772A (en) | 2017-01-20 |
US9710629B2 (en) | 2017-07-18 |
CN106464679B (en) | 2021-01-26 |
WO2015175634A1 (en) | 2015-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10255417B2 (en) | Electronic device with method for controlling access to same | |
CN108563936B (en) | Task execution method, terminal device and computer-readable storage medium | |
US9652663B2 (en) | Using facial data for device authentication or subject identification | |
US20170163883A1 (en) | Method and apparatus for preventing photograph from being shielded | |
KR102230691B1 (en) | Method and device for recognizing biometric information | |
US20150347732A1 (en) | Electronic Device and Method for Controlling Access to Same | |
US20140232843A1 (en) | Gain Value of Image Capture Component | |
TWI700607B (en) | Unlocking system and method | |
US9924090B2 (en) | Method and device for acquiring iris image | |
KR102371211B1 (en) | Device and method for authenticating biometric data using a plural camera | |
TWI752105B (en) | Feature image acquisition method, acquisition device, and user authentication method | |
TWI735858B (en) | Method and apparatus of adpative infrared proejction control | |
KR102618590B1 (en) | Method and electronic device for determining light source of images | |
US11687635B2 (en) | Automatic exposure and gain control for face authentication | |
US11328168B2 (en) | Image recognition method and apparatus | |
CN111355843A (en) | Brightness adjusting method and device, mobile terminal and storage medium | |
US9684828B2 (en) | Electronic device and eye region detection method in electronic device | |
CN108846321B (en) | Method and device for identifying human face prosthesis and electronic equipment | |
KR102628414B1 (en) | Image capturing system and network system supporting privacy mode | |
CN112417998A (en) | Method and device for acquiring living body face image, medium and equipment | |
WO2016117293A1 (en) | Device, system, and method for displaying an image together with a superimposed light component representing a code | |
KR20180076779A (en) | Terminal and iris recognition method using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MOTOROLA MOBILITY LLC, ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ALAMEH, RACHID M;SLABY, JIRI;REEL/FRAME:032877/0152 Effective date: 20140507 |
|
AS | Assignment |
Owner name: GOOGLE TECHNOLOGY HOLDINGS LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA MOBILITY LLC;REEL/FRAME:034500/0001 Effective date: 20141028 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |